CVE-2024-43416

GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

History

07 Jan 2025, 17:05

Type Values Removed Values Added
References () https://github.com/glpi-project/glpi/security/advisories/GHSA-j8gc-xpgr-2ww7 - () https://github.com/glpi-project/glpi/security/advisories/GHSA-j8gc-xpgr-2ww7 - Vendor Advisory
References () https://github.com/glpi-project/glpi/commit/9be1466053f829680db318f7e7e5880d2d789c6d - () https://github.com/glpi-project/glpi/commit/9be1466053f829680db318f7e7e5880d2d789c6d - Patch
CWE CWE-200 NVD-CWE-noinfo
CPE cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*
First Time Glpi-project
Glpi-project glpi
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

18 Nov 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-18 17:15

Updated : 2025-01-07 17:05


NVD link : CVE-2024-43416

Mitre link : CVE-2024-43416


JSON object : View

Products Affected

glpi-project

  • glpi